cybersecurity
                                Check your printers for leftover GDPR-regulated PII
Many companies are embracing the GDPR as an opportunity to improve privacy, security, and data management, by cutting down on the amount of personal data they keep, ditching …
                                Top six security and risk management trends
Business leaders are becoming increasingly conscious of the impact cybersecurity can have on business outcomes. Gartner said that security leaders should harness this …
                                How connected and secure is the modern workplace?
In collaboration with Microsoft, Ingram Micro Cloud UK commissioned market research firm YouGov to survey 1,000 workers employed by small and mid-size businesses with 50 to …
                                The modern CSO: Future-proofing your organization in a disruptive world
“There are three essential skill sets a modern day CSO must have. The first is knowledge of the business to better align a security strategy to company objectives …
                                Are privacy and personal identity impossible to protect?
While consumers and businesses expand their use of social media and electronic services to record levels, many of America’s most knowledgeable security professionals don’t …
                                The benefits of mature cloud security strategies
Organizations that take a pragmatic approach to securing the use of user- and business-unit-led-cloud services realize appreciable business benefits compared with …
                                Cybersecurity remains non-core competency for most C-suite executives
In today’s digital economy, it is essential that companies of every size can collect, store and adequately protect customer data and proprietary secrets. Failure to do so will …
                                Identity verification: Staying ahead of post-breach era consumer preferences
In the wake of numerous high-profile data breaches and privacy incidents, consumers are increasingly concerned about the security of their identities and what companies are …
                                Cybercriminals will gravitate to criminal activity that maximizes their profit
McAfee released its McAfee Labs Threats Report: June 2018, examining the growth and trends of new malware, ransomware, and other threats in Q1 2018. McAfee Labs saw on average …
                                91% of critical incidents involve known, legitimate binaries like PowerShell
Opportunistic threat actors are leveraging trusted tools, like PowerShell, to retrieve and execute malicious code from remote sources. According to eSentire, 91% of endpoint …
                                Mobile is the new frontier for malicious bots
Distil Networks analyzed over 100 million mobile devices on its networks. The findings suggest that sophisticated cybercriminals and bot operators now implement a new …
                                Data guides the new security perimeter
A recent Kaspersky Lab report finds data breaches now cost enterprises more than $1.2 million. The report also finds that the success of digital transformation projects are …
Featured news
Resources
Don't miss
- Deepfakes, fraud, and the fight for trust online
 - Product showcase: Cogent Community democratizes vulnerability intelligence with agentic AI
 - Cyber-espionage campaign mirroring Sandworm TTPs hit Russian and Belarusian military
 - A new way to think about zero trust for workloads
 - Heisenberg: Open-source software supply chain health check tool